Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection
- 1 January 2012
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Virtuoso: Narrowing the Semantic Gap in Virtual Machine IntrospectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Jump-oriented programmingPublished by Association for Computing Machinery (ACM) ,2011
- Return-oriented programming without returnsPublished by Association for Computing Machinery (ACM) ,2010
- Secure in-VM monitoring using hardware virtualizationPublished by Association for Computing Machinery (ACM) ,2009
- Lares: An Architecture for Secure Active Monitoring Using Virtualization2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
- OvershadowPublished by Association for Computing Machinery (ACM) ,2008
- Secure and Flexible Monitoring of Virtual MachinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- The geometry of innocent flesh on the bonePublished by Association for Computing Machinery (ACM) ,2007
- Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstructionPublished by Association for Computing Machinery (ACM) ,2007
- Automated detection of persistent kernel control-flow attacksPublished by Association for Computing Machinery (ACM) ,2007